Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Upgrading Security Using a Retrofit Approach

By Diane Ritchey
September 1, 2009
John Doude, airport operations supervisor at the Brownsville-South Padre Island International Airport, tests the airport’s new access control system.


Facility security, especially at airports, can be very costly. However, Brownsville South Padre Island International Airport (BSPIIA) recently received a newly-retrofitted system that ranks as high in access control and security as larger international airports, but at a fraction of the traditional cost.

The airport was experiencing problems with its previous electronic access control vendor – it was unable to eliminate intermittent disruptions – which forced the airport to temporarily revert to its original manual keyed lock system to maintain security. Eventually, the previous access control system was only used to make ID badges.
     
BSPIIA was looking for an improved working electronic access control system in addition to upgrading overall security to the latest Transportation Safety Administration (TSA) compliances.
     
Since Brownsville doesn’t have a city aviation department like larger metropolitan areas, it worked with a consulting engineering firm, Ross & Baruzzini (R&B) in St. Louis, Mo., to design and manage a security retrofit.


Saving by Integrating

Instead of a “tear-down and start from scratch” strategy, BSPIIA was able to save tens of thousands of dollars in both labor and materials by having a retrofitted electronic access control system for less money. “Ten years ago it wouldn’t have been possible, but today’s advancements in technology have afforded BSPIIA’s access control software the same functionality as a huge multiple-terminal facility such as Miami International Airport,” said Theresa Smith, senior project manager, R&B.
     
BSPIIA used Matrix Systems’ Frontier software to integrate existing BSPIIA equipment as well as future ancillary component upgrades as they become available on the market.  
     
In addition to the software, Matrix Systems provided access control hardware consisting of a server, two networked workstations, one building controller, 10 reader control modules (RCM), and card readers for approximately 12 doors, bag belts and TSA security gates.


Unconventional Worked

The access control retrofit required some unconventional access control set-ups. Unlike larger airports where TSA checkpoints are open 24/7, the infrequency of off-peak flights at BSPIIA often requires closing and locking TSA checkpoints. BSPIIA wanted accountability on which officers closed and opened the gates and at what times, so the rolling overhead security grilles were outfitted with special card readers so that the access control software could record all of those events.  
     
In addition to retaining existing security video and cabling infrastructure, the airport wanted to integrate its three original circa 1950’s bag belts into the security system. The equipment was perfectly functional, however it was manufactured long before microprocessors were used to control and monitor baggage handling equipment. Furthermore, original schematics on their electro-mechanical controls were no longer available, which made their integration into the new access control software totally customized. “Replacing bag belts is a huge expense and bringing in additional contractors to solve the integration challenges would have raised the access control renovation costs significantly,” said Brown.
     
Also, much of the cable infrastructure remained in place at a savings to BSPIIA — a majority of the 12-volt and 24-volt DC cabling was reused in the re-design. 


The Result

In addition to saving money and salvaging many existing magnetic door lock/card reader combinations and bag belts, airport security officials now have access to real time recording of a security event. If a door is breached, for example, the access control system automatically activates the security system’s security video and digital video recording (DVR) to record the event in real time, but also saves what was recorded several seconds before the alarm was triggered.
     
In addition, if an alarm is activated, the new access control software notifies the airport director, airport operations supervisor, as well as other security staffers and administration via cell phone and email.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1118-talk-Feat-slide1_900px

    An All Hazards Approach

    See More
  • Boeing - Dave Komendat - Security Magazine

    Mitigating the Insider Threat: Boeing's Successful Approach

    See More
  • Using Smartphone-Based Access Control to Keep Students Happy

    See More

Related Products

See More Products
  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing